lessons 5-9 Flashcards
Targeted attack
is when a threat actor chooses a target for a specific objective. The choice of the target is influenced by the perceived value of the outcome
Opportunistic attack
is when a threat actor takes advantage of a vulnerable target (not previously knowing them). the choice of target is generally influenced by work factors (Time effort and resources to accomplish a task)
Hacktivist
threat actor making a Political statement, generally talented. Funding variable
Organized crime (cyber criminals)
out to make money, well organized, well funded
Insiders | Shadow IT
someone at the organization that’s disgruntled
Script Kiddies
threat actor that does it for bragging rights or notoriety. Low level of sophistication
Hackers
financial gain, notoriety. Generally talented
NON-ADVERSARIAL THREATS
- Natural: natural occurrences such as earthquakes, floods, fire, pollutants, pandemics
- Operational: Loss of service like electricity, HVAC, technical issues, com, failure
- Human: Accidents, civil disturbances, work stoppages.
Threat Modeling
Is a structured process by which potential threats and threat actors can be identified, enumerated, and prioritized.
Asset-centric
What/why. Identifies valued assets and motivation
Architecture-centric
How. identifies system design components, strengths, and weaknesses.
Attacker-centric
Who- identifies the adversaries.
THREAT INTELLIGENCE
evidence-based knowledge about emerging threats that can be used to inform control decisions
OSINT - OPEN SOURCE INTELLIGENCE
is a term used to refer to the data collected from publicly available sources to be used in an intelligence context. OSINT framework is a structured collection of OSINT tools.
CISA
America’s cyber defense agency- resources, visit on a regular basis!
THREAT VECTOR
Also known as an attack vector is a potential pathway, or scenario that can be exploited
*Common threat vectors include: malicious emails in phishing attacks, weak or stolen passwords, drive-by download attacks, web applications, out of date applications or devices, and trusted relationships
attack surface
is the sum of all threat vectors.
DEFAULT CREDENTIALS
*Issue- initially set up by the vendor. Built-in admin username and password
*Impact- unauthorized access and compromise. Pathways to pivot to other devices- a quick Google search will usually reveal default credentials for a specific product.
*Causes- convenience, forgetfulness, laziness
*Response- change or disable the default credentials
WEAK PERMISSIONS
- Issue- are those that allow for unnecessary access (device, cloud, application)
- Impact- unauthorized access, access violations, privacy violations
- Causes- lack of understanding, poor classification, overconfidence.
- Response- documented policies and procedures. Management education, config. Management and standards
DATA EXFILTRATION
the unauthorized transfer of data from a computer or network, typically carried out by cyber attackers to steal sensitive information such as personal data, financial records, or intellectual property.
OPEN SOURCE PORTS
network ports that are actively listening for incoming connections and are accessible from outside the network.
* Issue- ports are those in listening mode
* Impact- exposure, potential exploit, unauthorized access, denial of service, integrity of device management
* Causes- poor or nonexistent config. Management, unrestricted permission to install a device or software
* Response- Config. Management, ongoing system hardening, account restrictions
UNSUPPORTED SYSTEMS & SOFTWARE
*Issue- 2 issues: unauthorized installation of devices/software OR end of life (EOL)/ end of support (EOS)
* Impact- exploits, compatibility issues, unauthorized access.
* Causes- lack of centralized control, and local admin privileges. Absence of refresh policies and lack of understanding.
* Response- refresh policies and standards, resource management, budget allocation
THIRD-PARTY THREAT VECTORS
include vendors, managed service providers (MSPs), business partners, consultants, and contractors that in some interact with our organization data
Fourth-parties
are vendors that third-party sources through- these manifest as risks to the organization
supply chain
an entire ecosystem or organizations, processes, people, and resources involved in providing a product or service
END OF LIFE
EOL: the date when the product, or service of subscription is determined to be obsolete.
END OF SUPPORT
EOS: the last date to receive applicable service and support
EOL | EOS RISKS
Why can’t we just keep using the hardware?
Adversaries will continue to identify and exploit vulnerabilities
Exposure to litigation for not upholding the standard or due care
Risk of downtime due to lack of support
Incompatibility with newer OS, applications, and hardware.
service level agreements (SLA)
a contract between a service provider and a customer that outlines the expected level of service, including specific performance standards and responsibilities.
SYSTEM SPRAWL
the uncontrolled growth and spread of IT systems and resources within an organization, making them difficult to manage and secure.
non conformance
a situation where products, processes, or services fail to meet specified standards, requirements, or regulations, resulting in deviations from expected quality or performance.
ISA
Information Sharing and Analysis. the sharing of information and analysis related to cybersecurity threats and vulnerabilities among organizations to improve the overall security posture of the supply chain.
Social Engineering
Is the action of exploiting human nature rather than technical hacking techniques to gain access to minds, systems, data or building
Pretexts
are fabricated stories or scenarios used to conceal the true purpose of an activity. Pretexts generally use enough truth to make them appear plausible.
Impersonation
is an act of pretending to be someone else.
Phishing-
pretexting and impersonation using email, casting a wide net. Spear phishing targets a specific group or individual, whaling targets high-profile individuals.
SMAshing
pretexting and impersonation using texts.
Vishing
pretexting and impersonation using voice
Watering Hole-
describes the exploitation of a website or social media app that is frequented by the target. (making fake profiles to target you on Facebook, and Instagram)
Shoulder Surfing
covert observation nearby or remote
Piggybacking/ Tailgating
when an unauthorized person enters a checkpoint close behind, or in concert with authorized personnel
Dumpster diving
the act or going through trash for information
Baiting
the use of a gift for infiltration. (like a USB drive)
Disinformation-
false or misleading information spread on purpose to deceive.
Shallow fake
the alteration of media content using simple video editing software
Deep fake-
the use of machine learning and or AI to manipulate or generate deceptive audio or video content.
Ethical disclosure
is the practice of publishing information related to a vulnerability or finding. The purpose is to inform others of potential risks so they can make informed decisions and take appropriate action.
Full disclosure
is making all details public without regard to additional harm that may be caused to others including exploitation by adversaries.
Responsible disclosure
is making enough information known so that informed decisions can be made while not releasing details that could be useful to an adversary.
VULNERABILITY MANAGEMENT
the process of identifying, assessing, reporting, prioritizing,and mitigating vulnerabilities.
zero day (0-day) vulnerability
is a flaw in hardware or software that has been discovered but a fix is not yet available.
window of vulnerability (WoV)
The time from when an exploit first becomes active to when the number of vulnerable systems shrinks to an insignificant number
Escalation
access to a protected area
Buffer overflow
a buffer overflow is a type of software bug where a program writes more data to a block of memory, or buffer than it is supposed to hold, causing the excess data to overwrite adjacent memory. This can lead to crashes, data corruption, or give attackers a way to exploit the system.
Memory leak
when a program fails to release memory that is no longer needed, causing it to consume more and more memory over time. This can eventually slow down the system or cause it to run out of memory and crash.
Race condition
is a flaw that produces an unexpected result when the timing of actions impact other actions
Time-of- check- TOC
is when a program checks the state of a resource and then uses that info to make a decision.
Time-of-evaluation- TOE
is when a program relies on the timing of events concurrently or in a specific order